Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 05:01
Behavioral task
behavioral1
Sample
a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
a81426de6f3c9c9689e50d2b7b8691ad
-
SHA1
ee4a836c6dce6afdb3a96a16881c5eaa10631927
-
SHA256
96325fde0a5b1cbec28c875bd113877d7693a387df77998fc91cd756f5963d6a
-
SHA512
34436db506ce61f32cf933ee7d17148767940a8bdd70c34c11afbbc425c425f9ee5420b4f2a3e13c9f718a373330a4f72b35aa7060747db9adb851e10e4036f3
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ6:0UzeyQMS4DqodCnoe+iitjWwwG
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 408 explorer.exe 3196 explorer.exe 3144 spoolsv.exe 2472 spoolsv.exe 428 spoolsv.exe 3828 spoolsv.exe 4776 spoolsv.exe 4612 spoolsv.exe 2400 spoolsv.exe 2324 spoolsv.exe 3312 spoolsv.exe 404 spoolsv.exe 3512 spoolsv.exe 2328 spoolsv.exe 4416 spoolsv.exe 4660 spoolsv.exe 4216 spoolsv.exe 3516 spoolsv.exe 3984 spoolsv.exe 928 spoolsv.exe 2496 spoolsv.exe 536 spoolsv.exe 1912 spoolsv.exe 3348 spoolsv.exe 1332 spoolsv.exe 2192 spoolsv.exe 2572 spoolsv.exe 4412 spoolsv.exe 4528 spoolsv.exe 1856 spoolsv.exe 4336 spoolsv.exe 3228 explorer.exe 1336 spoolsv.exe 4052 spoolsv.exe 4604 spoolsv.exe 2188 spoolsv.exe 2652 spoolsv.exe 3732 spoolsv.exe 3716 spoolsv.exe 2008 spoolsv.exe 4588 spoolsv.exe 3284 spoolsv.exe 5068 spoolsv.exe 3344 spoolsv.exe 3036 spoolsv.exe 3280 spoolsv.exe 2656 spoolsv.exe 4868 spoolsv.exe 3520 spoolsv.exe 996 explorer.exe 3880 spoolsv.exe 5036 spoolsv.exe 3200 spoolsv.exe 5072 spoolsv.exe 4556 explorer.exe 4464 spoolsv.exe 4740 spoolsv.exe 2448 spoolsv.exe 3768 spoolsv.exe 4440 spoolsv.exe 3832 explorer.exe 2044 spoolsv.exe 2992 spoolsv.exe 1080 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Suspicious use of SetThreadContext 57 IoCs
description pid Process procid_target PID 2968 set thread context of 4140 2968 a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe 86 PID 408 set thread context of 3196 408 explorer.exe 95 PID 3144 set thread context of 4336 3144 spoolsv.exe 124 PID 2472 set thread context of 1336 2472 spoolsv.exe 126 PID 428 set thread context of 4052 428 spoolsv.exe 127 PID 3828 set thread context of 4604 3828 spoolsv.exe 128 PID 4776 set thread context of 2188 4776 spoolsv.exe 129 PID 4612 set thread context of 2652 4612 spoolsv.exe 130 PID 2400 set thread context of 3732 2400 spoolsv.exe 131 PID 2324 set thread context of 3716 2324 spoolsv.exe 132 PID 3312 set thread context of 2008 3312 spoolsv.exe 133 PID 404 set thread context of 4588 404 spoolsv.exe 134 PID 3512 set thread context of 5068 3512 spoolsv.exe 136 PID 2328 set thread context of 3344 2328 spoolsv.exe 137 PID 4416 set thread context of 3036 4416 spoolsv.exe 138 PID 4660 set thread context of 3280 4660 spoolsv.exe 139 PID 4216 set thread context of 2656 4216 spoolsv.exe 140 PID 3516 set thread context of 4868 3516 spoolsv.exe 141 PID 3984 set thread context of 3520 3984 spoolsv.exe 142 PID 928 set thread context of 5036 928 spoolsv.exe 145 PID 2496 set thread context of 5072 2496 spoolsv.exe 147 PID 536 set thread context of 4740 536 spoolsv.exe 150 PID 1912 set thread context of 4440 1912 spoolsv.exe 153 PID 1332 set thread context of 3772 1332 spoolsv.exe 159 PID 2192 set thread context of 3964 2192 spoolsv.exe 160 PID 2572 set thread context of 1200 2572 spoolsv.exe 162 PID 4412 set thread context of 564 4412 spoolsv.exe 163 PID 4528 set thread context of 3896 4528 spoolsv.exe 164 PID 1856 set thread context of 4120 1856 spoolsv.exe 176 PID 3228 set thread context of 952 3228 explorer.exe 181 PID 3284 set thread context of 396 3284 spoolsv.exe 182 PID 996 set thread context of 4268 996 explorer.exe 184 PID 3880 set thread context of 1676 3880 spoolsv.exe 185 PID 3200 set thread context of 2316 3200 spoolsv.exe 188 PID 4556 set thread context of 1908 4556 explorer.exe 190 PID 4464 set thread context of 1840 4464 spoolsv.exe 191 PID 2448 set thread context of 3352 2448 spoolsv.exe 192 PID 3768 set thread context of 4424 3768 spoolsv.exe 193 PID 3832 set thread context of 3932 3832 explorer.exe 194 PID 2044 set thread context of 4484 2044 spoolsv.exe 195 PID 2992 set thread context of 3524 2992 spoolsv.exe 197 PID 1552 set thread context of 1420 1552 explorer.exe 201 PID 3724 set thread context of 4580 3724 spoolsv.exe 202 PID 4984 set thread context of 1324 4984 explorer.exe 205 PID 3608 set thread context of 4500 3608 spoolsv.exe 206 PID 2204 set thread context of 3756 2204 spoolsv.exe 207 PID 4436 set thread context of 4796 4436 spoolsv.exe 208 PID 896 set thread context of 3252 896 spoolsv.exe 209 PID 552 set thread context of 3244 552 spoolsv.exe 211 PID 1436 set thread context of 3848 1436 spoolsv.exe 213 PID 4048 set thread context of 2836 4048 spoolsv.exe 215 PID 1288 set thread context of 4012 1288 spoolsv.exe 217 PID 2336 set thread context of 1284 2336 spoolsv.exe 218 PID 3132 set thread context of 5056 3132 spoolsv.exe 219 PID 792 set thread context of 728 792 explorer.exe 221 PID 4512 set thread context of 3728 4512 spoolsv.exe 222 PID 2464 set thread context of 1484 2464 spoolsv.exe 223 -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4140 a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe 4140 a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3196 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4140 a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe 4140 a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 3196 explorer.exe 4336 spoolsv.exe 4336 spoolsv.exe 1336 spoolsv.exe 1336 spoolsv.exe 4052 spoolsv.exe 4052 spoolsv.exe 4604 spoolsv.exe 4604 spoolsv.exe 2188 spoolsv.exe 2188 spoolsv.exe 2652 spoolsv.exe 2652 spoolsv.exe 3732 spoolsv.exe 3732 spoolsv.exe 3716 spoolsv.exe 3716 spoolsv.exe 2008 spoolsv.exe 2008 spoolsv.exe 4588 spoolsv.exe 4588 spoolsv.exe 5068 spoolsv.exe 5068 spoolsv.exe 3344 spoolsv.exe 3344 spoolsv.exe 3036 spoolsv.exe 3036 spoolsv.exe 3280 spoolsv.exe 3280 spoolsv.exe 2656 spoolsv.exe 2656 spoolsv.exe 4868 spoolsv.exe 4868 spoolsv.exe 3520 spoolsv.exe 3520 spoolsv.exe 5036 spoolsv.exe 5036 spoolsv.exe 5072 spoolsv.exe 5072 spoolsv.exe 4740 spoolsv.exe 4740 spoolsv.exe 4440 spoolsv.exe 4440 spoolsv.exe 1080 spoolsv.exe 1080 spoolsv.exe 3772 spoolsv.exe 3772 spoolsv.exe 3964 spoolsv.exe 3964 spoolsv.exe 1200 spoolsv.exe 1200 spoolsv.exe 564 spoolsv.exe 564 spoolsv.exe 3896 spoolsv.exe 3896 spoolsv.exe 4120 spoolsv.exe 4120 spoolsv.exe 952 explorer.exe 952 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2968 wrote to memory of 4744 2968 a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe 82 PID 2968 wrote to memory of 4744 2968 a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe 82 PID 2968 wrote to memory of 4140 2968 a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe 86 PID 2968 wrote to memory of 4140 2968 a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe 86 PID 2968 wrote to memory of 4140 2968 a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe 86 PID 2968 wrote to memory of 4140 2968 a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe 86 PID 2968 wrote to memory of 4140 2968 a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe 86 PID 4140 wrote to memory of 408 4140 a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe 87 PID 4140 wrote to memory of 408 4140 a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe 87 PID 4140 wrote to memory of 408 4140 a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe 87 PID 408 wrote to memory of 3196 408 explorer.exe 95 PID 408 wrote to memory of 3196 408 explorer.exe 95 PID 408 wrote to memory of 3196 408 explorer.exe 95 PID 408 wrote to memory of 3196 408 explorer.exe 95 PID 408 wrote to memory of 3196 408 explorer.exe 95 PID 3196 wrote to memory of 3144 3196 explorer.exe 96 PID 3196 wrote to memory of 3144 3196 explorer.exe 96 PID 3196 wrote to memory of 3144 3196 explorer.exe 96 PID 3196 wrote to memory of 2472 3196 explorer.exe 97 PID 3196 wrote to memory of 2472 3196 explorer.exe 97 PID 3196 wrote to memory of 2472 3196 explorer.exe 97 PID 3196 wrote to memory of 428 3196 explorer.exe 98 PID 3196 wrote to memory of 428 3196 explorer.exe 98 PID 3196 wrote to memory of 428 3196 explorer.exe 98 PID 3196 wrote to memory of 3828 3196 explorer.exe 99 PID 3196 wrote to memory of 3828 3196 explorer.exe 99 PID 3196 wrote to memory of 3828 3196 explorer.exe 99 PID 3196 wrote to memory of 4776 3196 explorer.exe 100 PID 3196 wrote to memory of 4776 3196 explorer.exe 100 PID 3196 wrote to memory of 4776 3196 explorer.exe 100 PID 3196 wrote to memory of 4612 3196 explorer.exe 101 PID 3196 wrote to memory of 4612 3196 explorer.exe 101 PID 3196 wrote to memory of 4612 3196 explorer.exe 101 PID 3196 wrote to memory of 2400 3196 explorer.exe 102 PID 3196 wrote to memory of 2400 3196 explorer.exe 102 PID 3196 wrote to memory of 2400 3196 explorer.exe 102 PID 3196 wrote to memory of 2324 3196 explorer.exe 103 PID 3196 wrote to memory of 2324 3196 explorer.exe 103 PID 3196 wrote to memory of 2324 3196 explorer.exe 103 PID 3196 wrote to memory of 3312 3196 explorer.exe 104 PID 3196 wrote to memory of 3312 3196 explorer.exe 104 PID 3196 wrote to memory of 3312 3196 explorer.exe 104 PID 3196 wrote to memory of 404 3196 explorer.exe 105 PID 3196 wrote to memory of 404 3196 explorer.exe 105 PID 3196 wrote to memory of 404 3196 explorer.exe 105 PID 3196 wrote to memory of 3512 3196 explorer.exe 106 PID 3196 wrote to memory of 3512 3196 explorer.exe 106 PID 3196 wrote to memory of 3512 3196 explorer.exe 106 PID 3196 wrote to memory of 2328 3196 explorer.exe 107 PID 3196 wrote to memory of 2328 3196 explorer.exe 107 PID 3196 wrote to memory of 2328 3196 explorer.exe 107 PID 3196 wrote to memory of 4416 3196 explorer.exe 108 PID 3196 wrote to memory of 4416 3196 explorer.exe 108 PID 3196 wrote to memory of 4416 3196 explorer.exe 108 PID 3196 wrote to memory of 4660 3196 explorer.exe 109 PID 3196 wrote to memory of 4660 3196 explorer.exe 109 PID 3196 wrote to memory of 4660 3196 explorer.exe 109 PID 3196 wrote to memory of 4216 3196 explorer.exe 110 PID 3196 wrote to memory of 4216 3196 explorer.exe 110 PID 3196 wrote to memory of 4216 3196 explorer.exe 110 PID 3196 wrote to memory of 3516 3196 explorer.exe 111 PID 3196 wrote to memory of 3516 3196 explorer.exe 111 PID 3196 wrote to memory of 3516 3196 explorer.exe 111 PID 3196 wrote to memory of 3984 3196 explorer.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4744
-
-
C:\Users\Admin\AppData\Local\Temp\a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a81426de6f3c9c9689e50d2b7b8691ad_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4140 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:408 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3196 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3144 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4336 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3228 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- Suspicious use of SetWindowsHookEx
PID:952
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2472 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1336
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:428 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4052
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3828 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4604
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4776 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2188
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4612 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2652
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2400 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3732
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2324 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3716
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3312 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:404 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4588
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3512 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5068
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2328 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3344
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4416 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4660 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3280
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4216 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3516 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4868
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3984 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3520 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:996 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4268
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:928 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5036
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2496 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5072 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4556 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1908
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:536 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4740
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1912 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4440 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3832 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3932
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3348 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1080 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1552 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1420
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1332 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3772
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2192 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3964
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2572 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1200
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4412 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:564
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4528 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3896 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4984 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1324
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1856 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4120 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:792 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:728
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3284 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:396
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4880
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3880 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1676
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3200 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2316
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4496
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4464 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1840
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2448 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3352
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3768 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4424
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2044 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4484
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2992 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3524
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:1780
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3724 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4580
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2916
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3608 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4500
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2204 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3756
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4436 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4796
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:896 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3252
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:552 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3244
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:520
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1436 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3848
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4048 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2836
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1316
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:1288 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4012
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2336 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1284
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3132 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5056
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4512 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3728
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2464 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1484
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4976
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1508
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2960
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4888
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2624
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3628
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1540
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4536
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3604
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4568
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3996
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:3692
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD585d8f9d1b8277953b9629b4398a4004a
SHA1cf62421b40bee6ce14c66d52c456f9a40419e689
SHA256285e28b95f048ad8b3d386b84ad7ed39a35cb8767e4ce902a6eb843b154d78be
SHA5126a74fc3445090adf9b1409adf4891787b3cbc082f8204750593b6a371df452be05cf7f3856c462c6741328a4b0f2efadf37b9f7deead9dafdd5a609ff216ce06
-
Filesize
2.2MB
MD50519601af0c38aba0d491ceef15914f9
SHA1aaa039df6be4e418af8fbad4ebe9b867b9f4e3dd
SHA256eee94afe1041d2e780f2b666802239b9236484e6e2e4a74cf86412cebcb97e0c
SHA5125d27c28ae36a2cccf26f1de2306053739c5d91faa7837c212228a289b7e428756f4a31a9ff03617447bae9f2946bd15460db0a8992e32d72f4c1e3d9c2bd796f